Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isse/isse2010.bht:"
@proceedings{DBLP:conf/isse/2010, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, publisher = {Vieweg+Teubner}, year = {2011}, url = {https://doi.org/10.1007/978-3-8348-9788-6}, doi = {10.1007/978-3-8348-9788-6}, isbn = {978-3-8348-1438-8}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Arias10, author = {Santiago Uriel Arias}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Taking Signatures Seriously - Combining Biometric and Digital Signatures}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {323--333}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_31}, doi = {10.1007/978-3-8348-9788-6\_31}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/Arias10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Balboni10, author = {Paolo Balboni}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Data Protection and Data Security Issues Related to Cloud Computing in the {EU}}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {163--172}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_16}, doi = {10.1007/978-3-8348-9788-6\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Balboni10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BeckersJ10, author = {Kristian Beckers and Jan J{\"{u}}rjens}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Security and Compliance in Clouds}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {91--100}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_9}, doi = {10.1007/978-3-8348-9788-6\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/BeckersJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BenteVH10, author = {Ingo Bente and J{\"{o}}rg Vieweg and Josef von Helden}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Countering Phishing with TPM-bound Credentials}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {236--246}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_23}, doi = {10.1007/978-3-8348-9788-6\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/BenteVH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BraunA10, author = {Werner Braun and Dirk Arendt}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {AusweisApp and the eID Service/Server - Online Identification Finally more Secure}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {374--384}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_36}, doi = {10.1007/978-3-8348-9788-6\_36}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/BraunA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Brindley10, author = {Christian Brindley}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Authentication and Trust: Turning the Cloud inside out}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {72--79}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_7}, doi = {10.1007/978-3-8348-9788-6\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Brindley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/CaseyKV10, author = {Timothy Casey and Patrick Koeberl and Claire Vishik}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Defining Threat Agents: Towards a More Complete Threat Analysis}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {214--225}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_21}, doi = {10.1007/978-3-8348-9788-6\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/CaseyKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Cavoukian10, author = {Ann Cavoukian}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Privacy by Design: Best Practices for Privacy and the Smart Grid}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {260--270}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_25}, doi = {10.1007/978-3-8348-9788-6\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Cavoukian10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/CostaD10, author = {Luciana Costa and Roberta D'Amico}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Malware Detection and Prevention Platform: Telecom Italia Case Study}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {203--213}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_20}, doi = {10.1007/978-3-8348-9788-6\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/CostaD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/DAlessandroL10, author = {Rosalia D'Alessandro and Manuel Leone}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {A Mechanism for e-Banking Frauds Prevention and User Privacy Protection}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {226--235}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_22}, doi = {10.1007/978-3-8348-9788-6\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/DAlessandroL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/EichholzHMS10, author = {Jan Eichholz and Detlef H{\"{u}}hnlein and Gisela Meister and Johannes Schm{\"{o}}lz}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {New Authentication Concepts for Electronic Identity Tokens}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {26--38}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_3}, doi = {10.1007/978-3-8348-9788-6\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/EichholzHMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FaberP10, author = {Eberhard von Faber and Michael Pauly}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {User Risk Management Strategies and Models - Adaption for Cloud Computing}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {80--90}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_8}, doi = {10.1007/978-3-8348-9788-6\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/FaberP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FeldP10, author = {Sebastian Feld and Norbert Pohlmann}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Security Analysis of OpenID, followed by a Reference Implementation of an nPA-based OpenID Provider}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {13--25}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_2}, doi = {10.1007/978-3-8348-9788-6\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/FeldP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FibikovaM10, author = {Lenka Fib{\'{\i}}kov{\'{a}} and Roland M{\"{u}}ller}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {A Simplified Approach for Classifying Applications}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {39--49}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_4}, doi = {10.1007/978-3-8348-9788-6\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/FibikovaM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Flegel10, author = {Ulrich Flegel}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Privacy Compliant Internal Fraud Screening}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {191--199}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_19}, doi = {10.1007/978-3-8348-9788-6\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Flegel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Hamann10, author = {Ulrich Hamann}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Germany on the Road to Electronic Proof of Identity}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {1--9}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_1}, doi = {10.1007/978-3-8348-9788-6\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Hamann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/HammerliA10, author = {Bernhard M. H{\"{a}}mmerli and Henning H. Arendt}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Critical Infrastructure in Finance {PARSIFAL} Recommendations}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {115--121}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_11}, doi = {10.1007/978-3-8348-9788-6\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/HammerliA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Hansen10, author = {Marit Hansen}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Towards Future-Proof Privacy-Respecting Identity Management Systems}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {182--190}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_18}, doi = {10.1007/978-3-8348-9788-6\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Hansen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/HickRH10, author = {Sibylle Hick and Fares Rahmun and Ernest Hammerschmidt}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Visa Applications in {TG} Biometrics for Public Sector Applications}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {315--322}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_30}, doi = {10.1007/978-3-8348-9788-6\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/HickRH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Howard10, author = {Scott Howard}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{SCADA} and Control System Security: New Standards Protecting Old Technology}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {343--353}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_33}, doi = {10.1007/978-3-8348-9788-6\_33}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Howard10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Hoyer10, author = {Philip Hoyer}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{DSKPP} and PSKC, {IETF} Standard Protocol and Payload for Symmetric Key Provisioning}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {291--299}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_28}, doi = {10.1007/978-3-8348-9788-6\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Hoyer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/JawurekJ10, author = {Marek Jawurek and Martin Johns}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Security Challenges of a Changing Energy Landscape}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {249--259}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_24}, doi = {10.1007/978-3-8348-9788-6\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/JawurekJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Koeberl0RV10, author = {Patrick Koeberl and Jiangtao Li and Anand Rajan and Claire Vishik}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Silicon PUFs in Practice}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {300--311}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_29}, doi = {10.1007/978-3-8348-9788-6\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Koeberl0RV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/KutylowskiK10, author = {Miroslaw Kutylowski and Przemyslaw Kubiak}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Polish Concepts for Securing E-Government Document Flow}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {399--407}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_39}, doi = {10.1007/978-3-8348-9788-6\_39}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/KutylowskiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Lang10, author = {Ulrich Lang}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Cloud {\&} {SOA} Application Security as a Service}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {61--71}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_6}, doi = {10.1007/978-3-8348-9788-6\_6}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/Lang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Lasance10, author = {Marcus Lasance}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Single Sign-on(SSO) to Cloud based Services and Legacy Applications "Hitting the {IAM} wall"}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {53--60}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_5}, doi = {10.1007/978-3-8348-9788-6\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Lasance10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/LeitoldZ10, author = {Herbert Leitold and Bernd Zwattendorfer}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{STORK:} Architecture, Implementation and Pilots}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {131--142}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_13}, doi = {10.1007/978-3-8348-9788-6\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/LeitoldZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/LuftH10, author = {Matthias Luft and Thorsten Holz}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {A Small Leak will Sink a Great Ship: An Empirical Study of {DLP} Solutions}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {354--364}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_34}, doi = {10.1007/978-3-8348-9788-6\_34}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/LuftH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Margraf10, author = {Marian Margraf}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {The New German {ID} Card}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {367--373}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_35}, doi = {10.1007/978-3-8348-9788-6\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Margraf10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/MoralesSM10, author = {Roberto Morales and Jetzabel M. Serna and Manel Medina}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {A Policy-based Authorization Scheme for Resource Sharing in Pervasive Environments}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {271--279}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_26}, doi = {10.1007/978-3-8348-9788-6\_26}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/MoralesSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/PazzagliaLCDAGM10, author = {Jean{-}Christophe R. Pazzaglia and Volkmar Lotz and V. Campos Cerda and Ernesto Damiani and Claudio A. Ardagna and Sigrid G{\"{u}}rgens and Antonio Ma{\~{n}}a and Claudia Pandolfo and George Spanoudakis and Franco Guida and Renato Menicocci}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Advanced Security Service cERTificate for {SOA:} Certified Services go Digital}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {151--160}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_15}, doi = {10.1007/978-3-8348-9788-6\_15}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/PazzagliaLCDAGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Pope10, author = {Nick Pope}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Visual Representation of Advanced Electronic Signatures}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {280--290}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_27}, doi = {10.1007/978-3-8348-9788-6\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Pope10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/ReibleB10, author = {Volker Reible and Andre Braunmandl}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {The eID Function of the nPA within the European {STORK} Infrastructure}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {392--398}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_38}, doi = {10.1007/978-3-8348-9788-6\_38}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/ReibleB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Roessing10, author = {Rolf von Roessing}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Applying {BMIS} to Cloud Security}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {101--112}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_10}, doi = {10.1007/978-3-8348-9788-6\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Roessing10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/RossbergSM10, author = {Michael Rossberg and G{\"{u}}nter Sch{\"{a}}fer and Kai Martius}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Automatic Configuration of Complex IPsec-VPNs and Implications to Higher Layer Network Management}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {334--342}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_32}, doi = {10.1007/978-3-8348-9788-6\_32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/RossbergSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/RosslerT10, author = {Thomas R{\"{o}}ssler and Arne Tauber}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {The {SPOCS} Interoperability Framework: Interoperability of eDocuments and eDelivery Systems taken as Example}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {122--130}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_12}, doi = {10.1007/978-3-8348-9788-6\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/RosslerT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Terboven10, author = {Jens Terboven}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Postident Online with the new Personal Identity Card}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {385--391}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_37}, doi = {10.1007/978-3-8348-9788-6\_37}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Terboven10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Weiss10, author = {Bernhard Weiss}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Secure Networking is the Key to German Public e-Health Solution: Migration Towards an Integrated e-Health Infrastructure}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {143--150}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_14}, doi = {10.1007/978-3-8348-9788-6\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Weiss10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Wiele10, author = {Johannes Wiele}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {The Mask of the Honorable Citizen}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {173--181}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_17}, doi = {10.1007/978-3-8348-9788-6\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Wiele10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.